CFP last date
20 January 2025
Reseach Article

An Effective Intrusion Detection System for MANETs

Published on March 2014 by T. Prasanna Venkatesan, P. Rajakumar, A. Pitchaikkannu
International Conference on Advances in Computer Engineering and Applications
Foundation of Computer Science USA
ICACEA - Number 3
March 2014
Authors: T. Prasanna Venkatesan, P. Rajakumar, A. Pitchaikkannu
0c58baa6-acfc-4646-9745-361f391cd30d

T. Prasanna Venkatesan, P. Rajakumar, A. Pitchaikkannu . An Effective Intrusion Detection System for MANETs. International Conference on Advances in Computer Engineering and Applications. ICACEA, 3 (March 2014), 29-34.

@article{
author = { T. Prasanna Venkatesan, P. Rajakumar, A. Pitchaikkannu },
title = { An Effective Intrusion Detection System for MANETs },
journal = { International Conference on Advances in Computer Engineering and Applications },
issue_date = { March 2014 },
volume = { ICACEA },
number = { 3 },
month = { March },
year = { 2014 },
issn = 0975-8887,
pages = { 29-34 },
numpages = 6,
url = { /proceedings/icacea/number3/15629-1429/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computer Engineering and Applications
%A T. Prasanna Venkatesan
%A P. Rajakumar
%A A. Pitchaikkannu
%T An Effective Intrusion Detection System for MANETs
%J International Conference on Advances in Computer Engineering and Applications
%@ 0975-8887
%V ICACEA
%N 3
%P 29-34
%D 2014
%I International Journal of Computer Applications
Abstract

In the recent decades the mobile wireless communication becomes more attractive because of its applications in many fields. Moving from the wired communication to wireless communication, the security is the most important property to consider. Specifically in the mobile environment it has the vulnerability, because of its portability and scalability. The mobile ad hoc wireless communication has characteristics such as open medium, distributed environment and changing topology, it makes the network into most vulnerable to the attackers to make the intrusion. The attackers (intruders) can easily enter into the network and compromises the network to behave in the favors of his choice. The Mobile Ad hoc NETwork (MANET) should have the capability to detect such intrusion (attacks) and remove it. To survive the MANET from such intrusion, an Intrusion Detection System (IDS) should be enhanced to the MANET, which can efficiently identify the attacks of the intruders. In this paper it is discussed about various intrusion detection mechanisms and techniques for the MANET to detect the intrusion and intruders.

References
  1. B. Sun, L. Osborne, Y. Xiao and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Communications, pp. 56-63, October 2007.
  2. S. Sen and J. A. Clark, "Intrusion Detection in MANETs," Department of Computer Science, University of York, York, UK.
  3. A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Communications, pp. 48-60, February 2004.
  4. T. Anantvalee and J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, pp. 170–196, 2006.
  5. J. Zhang and M. Zulkernine, "A Hybrid Network Intrusion Detection Technique Using Random Forests," Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06), IEEE Computer Society, 2006.
  6. C. Xenakis, C. Panos and I. Stavrakakis, "A comparative Evaluation of Intrusion Detection Architectures for MANETs," computers & security 30, Elsevier, pp. 63-80, 2011.
  7. A. Nadeem and M. P. Howarth, "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks", IEEE Communications Surveys & Tutorials, 2013.
  8. A. Nadeem and M. P. Howarth, "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks", IEEE Communications Surveys & Tutorials, 2013.
  9. M. Bishop, "Computer Security: Art and Science", Addison Wesley, Nov. 2002.
  10. S. Buchegger and J. L. Boudec, "Performance Analysis of the CONFI-DANT Protocol", Proc. of ACM Int. Sym. on MANET and Computing, 2002.
  11. M. Y. Su, "Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks through Intrusion Detection Systems," Computer Communications, Elsevier, 34, pp. 107–117, 2011.
  12. X. Y. Zhang, Y. Sekiya and Y. Wakahara, "Proposal of a Method to Detect Black Hole Attack in MANETs", Proc. IEEE Inter. Symp. on Autonomous Decentralized System ISADS, 2009.
  13. E. A. Panaousis, L. Nazaryan and C. Politis, "Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications", Sep. 7-9, 2009, London, UK.
  14. H. L. Nguyen and U. T. Nguyen, "A study of different types of attacks on multicast in MANET", Elsevier, Ad Hoc Networks, 2008.
  15. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV," Ad Hoc Networks 6, Elsevier, pp. 578–599, 2008.
  16. A. Mishra, K. Nadkarni, A. Patcha and V. Techintrusion, "Detection In Wireless Ad Hoc Networks," IEEE Wireless Communications, pp. 48-60, February 2004.
  17. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw. , Boston, MA, pp. 255–265, 2000.
  18. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput. , vol. 6, no. 5, pp. 536–550, May 2007.
  19. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "Video transmission enhancement in presence of misbehaving nodes in MANETs," Int. J. Multimedia Syst. , vol. 15, no. 5, pp. 273–282, Oct. 2009.
  20. J. Cho, I. Chen and P. Feng, "Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks," IEEE Transactions on Reliability, Vol. 59, No. 1, pp. 231-241, March 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Manet Active Attacks Passive Attacks